NVIDIA Triton Vulnerabilities Could Let Attackers Hijack AI Inference Servers

Three NVIDIA vulnerabilities allow unauthorised users to obtain the IPC memory key and use it to craft malicious inference requests. Read more »

Attackers Use Proofpoint and Intermedia Link Wrapping to Hide Malicious URLs

Layers of link wrapping hide malicious URLs used for phishing. Learn how to protect against link wrapping attacks. Read more »

Cloudflare Accuses AI Startup of ‘Stealth Crawling Behavior’ Across Millions of Sites

Cloudflare is accusing Perplexity of using stealth crawlers to bypass site restrictions, triggering fresh concerns over how AI firms access web content. Read more »

Cisco Talos Researcher Reveals Method That Causes LLMs to Reveal Training Data

In this TechRepublic interview, researcher Amy Chang details the decomposition method and shares how organizations can protect themselves from LLM data extraction. Read more »

Microsoft Used China-Based Engineers to Maintain Vulnerable SharePoint

The application was exploited by at least three state-sponsored Chinese threat groups last month. Read more »

These Cybersecurity Skills Will Help You Get Noticed, Not Ghosted

Learn ethical hacking, network scanning, and real-world tools to stand out in the cybersecurity job market. Read more »

Dell Confirms Security Breach by Extortion Group, Calls Stolen Data ‘Fake’

Cyber extortion group World Leaks released more than 1.3TB of internal Dell data, including scripts and backups. Dell insists no sensitive customer information was exposed. Read more »

US Agencies Warn of Surging Interlock Ransomware Attacks Targeting Healthcare, Businesses

Federal agencies warn of rising Interlock ransomware attacks targeting healthcare and critical sectors using double extortion and advanced social engineering. Read more »

Microsoft Blames ‘China-Based Threat Actor’ for SharePoint Attacks

A series of cyberattacks targeting Microsoft collaboration software, specifically SharePoint, have been linked to Chinese hackers and threat actors. Read more »

Microsoft SharePoint Hackers Switch Gears to Spread Ransomware

Threat actors exploit SharePoint flaws to access internal systems, steal sensitive data, and carry out surveillance, impersonation, and extortion. Read more »
Subscribe to our Newsletter